O'Reilly logo

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition, 4th Edition by Adam Gordon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

Appendix F

Domain 5 Materials

The following Password Security Policy is referenced in Domain 5 – Identity and Access Management. You can download the materials from this appendix for free by going to the following link:

https://learning.isc2.org/content/cissp-textbook-appendices

Section x

IS Security Policies

mm/dd/yy

-Effective

mm/dd/yy

-Revised

Policy x.xx

Password

Information Services

-Author

Introduction

User authentication is a means to control who has access to an Information Resource system. Controlling the access is necessary for any Information Resource. Access gained by a non-authorized entity can cause loss ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required